The Sec Consult Security Lab reported an information disclosure vulnerability in MF910S product to ZTE PSIRT in October 2019. Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage. The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/158990/ZTE-Mobile-Hotspot-MS910S-Backdoor-Hardcoded-Password.html - | |
References | () http://seclists.org/fulldisclosure/2020/Aug/20 - | |
References | () http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011722 - Vendor Advisory |
Information
Published : 2019-11-07 20:15
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3422
Mitre link : CVE-2019-3422
CVE.ORG link : CVE-2019-3422
JSON object : View
Products Affected
zte
- mf910s_firmware
- mf910s
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor